Intelligent CISO Issue 81 | Page 44

industry

UNLOCKED

PROCESS OVER TOP-DOWN ENFORCEMENT : HOW TO EMPOWER EMPLOYEES TO PREVENT DATA LEAKS

Overly complex security rules , when unsupported by user-friendly tools , can overwhelm employees and even lead to more errors – the very vulnerabilities organisations seek to prevent . Anita Mavridis , VP of Product at Zivver , and Sue Musumeci , Director of Quality & Clinical Informatics at Chronic Care Staffing , explore practical strategies for empowering employees .

W hen it comes to safeguarding data , are

humans a vulnerability or an asset ? The answer very much depends on how organisations empower and enable their teams to deal with the many regulations and policies that define their cybersecurity strategy .
In the push to strengthen data security , many workers are beginning to feel disillusioned or overwhelmed by complex security rules that appear to serve the business rather than serve them as employees . When rules are enforced without adequate support in the form of new technologies and safeguards , the data security burden lies firmly on the shoulders of the employee , and the time and energy required to carry that burden can start to feel like a barrier to productivity .
This disconnect is echoed in recent research from Zivver , which shows that 51 % of IT leaders identify employee awareness as their top security challenge and 38 % report difficulties in fully engaging employees with security practices . This isn ’ t about apportioning blame , but accepting the frustrations felt among employers and employees in the pursuit of a common goal . It isn ’ t the individuals that warrant scrutiny , but the processes under which those individuals are expected to thrive .
Zivver ’ s research also highlights several key barriers impacting employee focus and productivity , with 41 % of respondents citing excessive bureaucracy , 27 % pointing to timeconsuming security protocols and 26 % identifying an overload of IT systems as significant roadblocks to getting things done securely .
When security processes are inadequate or begin to feel like a hindrance , workers tend to look for shortcuts , often inadvertently exposing their organisations to risk . In fact , while inbound threats like ransomware tend to grab the media headlines , accidental human error accounts for more than 80 % of data leaks . It ’ s clear that a fresh approach to cybersecurity is needed – one that supports and empowers employees to make the right decisions and embeds security policies into day-to-day operations instead of expecting employees to jump through numerous hoops .
The question here is , how can IT leaders encourage a security-first mindset that does not depend on complex manual steps or disruptive processes , but rather integrates data protection into everyday tasks in a way that makes security feel second nature ?
Data leaks : Human error , but not a human problem
While malicious inbound threats often dominate conversations around cybersecurity , it ’ s important not to overlook the impact of human error – one of the most common causes of data leaks . Employees aren ’ t just at risk of making mistakes due to negligence ; they ’ re often under pressure to meet tight deadlines , manage heavy workloads and keep pace with a growing list of security protocols .
Both Mavridis and Musumeci noted that in fields such as healthcare and legal services , where efficiency and speed are paramount , security measures can feel like obstacles rather than safeguards . When people feel rushed or overwhelmed , the chances of errors multiply .
44 WWW . INTELLIGENTCISO . COM